getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Vulnerability Management Software - Page 5

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


185 software options

Security Manager by FireMon logo

Manage Policy, Ensure Compliance, Gain Visibility & Control

learn more
FireMon is a network security management solution for hybrid cloud that ?delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration.

Read more about Security Manager by FireMon

Users also considered
Intruder logo

Vulnerability scanner that prevents security & data breaches

learn more
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.

Read more about Intruder

Users also considered
Detectify logo

Vulnerability management solution for security teams

learn more
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.

Read more about Detectify

Users also considered
OpenText Application Security Aviator logo

Application security, data security, and threat detection.

learn more
Fortify enables businesses of all sizes to protect their applications, data and the rest of their assets from cyber criminals. With strategic outcomes ranging from DevSecOps to secure data analytics, Fortify helps enterprises gain visibility into their applications, detect threats quickly and defend against them effectively with automated incident response capabilities.

Read more about OpenText Application Security Aviator

Users also considered
Tenable Cloud Security logo

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Tenable Cloud Security

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
ISS logo

Cloud-based compliance management solution

learn more
INSSIDE Security Suite is a leading cloud-based platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, and facilitating the creation of reports, analysis, and monitoring of compliance processes.

Read more about ISS

Users also considered
AWS Shield logo

DDoS and vulnerability management software

learn more
AWS Shield is a DDoS and vulnerability management software that helps businesses detect attacks and automate inline mitigations to minimize application latency and downtime. It allows staff members to detect attacks at lower traffic thresholds to optimize application DDoS resiliency and minimize false-positive notifications.

Read more about AWS Shield

Users also considered
Apiiro logo

AppSec management tool to secure cloud software development.

learn more
Apiiro is re-inventing the secure development lifecycle for agile and cloud-native development. It helps businesses transform application security into multidimensional application risk.

Read more about Apiiro

Users also considered
Cobalt logo

(previously CrowdCurity) Pen Testing as a Service

learn more
Cobalt - previously CrowdCurity - is a modern application security platform that supports a complete find-to-fix workflow for all penetration testing and vulnerability assessments throughout an organization

Read more about Cobalt

Users also considered
Cobalt logo

(previously CrowdCurity) Pen Testing as a Service

learn more
Cobalt - previously CrowdCurity - is a modern application security platform that supports a complete find-to-fix workflow for all penetration testing and vulnerability assessments throughout an organization

Read more about Cobalt

Users also considered
Pentest-Tools.com logo

Discover what's possible. Prove what's real.

learn more
From vulnerability scans to proof, Pentest-Tools.com gives 2,000+ security teams in 119 countries the speed, accuracy, and coverage to confidently validate and mitigate risks across their infrastructure (network, cloud, web apps, APIs).

Read more about Pentest-Tools.com

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
SAINT Security Suite logo

Cybersecurity and vulnerability assessment solution

learn more
SAINT Security Suite is a cybersecurity solution that helps businesses uncover, assess, and mitigate security risks across the entire security infrastructure. The platform provides granular, tailored reports that facilitate informed decision-making.

Read more about SAINT Security Suite

Users also considered
DeepSurface logo

Risk-based predictive vulnerability management platform

learn more
DeepSurface is a risk-based predictive vulnerability management platform for cybersecurity, delivering critical insights and actionable recommendations to the most vulnerable assets. It uses machine learning to detect vulnerabilities, provide prioritization, and manage critical patching—without causing disruption.

Read more about DeepSurface

Users also considered
Autobahn Fit logo

Vulnerability Prioritization & Remediation

learn more
Autobahn Security is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently.

Read more about Autobahn Fit

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
Carbon Black Cloud Workload logo

Vulnerability management solution

learn more
The Carbon Black Cloud Workload is a purpose-built vulnerability management solution for securing data centers. It helps users reduce the attack surface and protect critical applications, systems and networks from cyber threats.

Read more about Carbon Black Cloud Workload

Users also considered
Vulnerability Intelligence logo

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about Vulnerability Intelligence

Users also considered
ShadowKat logo

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered